BrikoX@lemmy.zip to Privacy Guides@lemmy.one · 4 months agoYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comexternal-linkmessage-square33fedilinkarrow-up1214
arrow-up1214external-linkYubiKeys are vulnerable to cloning attacks thanks to newly discovered side channelarstechnica.comBrikoX@lemmy.zip to Privacy Guides@lemmy.one · 4 months agomessage-square33fedilink
minus-squarebean@lemmy.worldlinkfedilinkEnglisharrow-up2·4 months agoThe fact that this happened is surprising in general, but not super practical. What’s the big deal? A: It affects other types of hardware which also used these crypto libraries. Some are easier to address than others.
The fact that this happened is surprising in general, but not super practical.
What’s the big deal? A: It affects other types of hardware which also used these crypto libraries. Some are easier to address than others.